Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

0 Comments
Continue reading

Is it Wrong to Purchase Access to Your Own Data?

Ransomware is a contender for the favorite method of attack for hackers. If you think about it, ransomware presents a no-loss situation. Either the victim pays the ransom and the hackers laugh all the way to the bank, or they move on to the next target and give them the same ultimatum.

0 Comments
Continue reading

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of several U.S. law enforcement agencies.

0 Comments
Continue reading

Ransomware Attack Strikes Atlanta

Ransomware can target all kinds of entities, but one of the most devastating attacks in recent memory was launched against Atlanta, Georgia earlier this year. Atlanta suffered from an incredibly sustained and powerful ransomware attack that disabled much of the municipal government.

0 Comments
Continue reading

What to Expect of Ransomware this Year

Ransomware exploded in 2017, and after a year with as much success as these attacks saw, it is no wonder that 2018 is expected to see more. However, in order to remain successful, ransomware will have to change and improve. In today’s blog, we explore a few predictions as to how this threat will do so.

0 Comments
Continue reading

Ransomware Increasingly Targets Android Devices

In recent years, how-to guides and YouTube videos have brought renewed enthusiasm for the phrase ‘Do It Yourself’. From services that will ship all the ingredients needed for a home-cooked meal right to your front door to a kit that contains all of the building materials one needs to make a fully functioning ‘tiny house’, DIY kits have made it easier for someone who is less than an expert to successfully complete a project or learn a skill. The Dark Web has taken this infatuation with ‘DIY’ to a whole new level with a rising increase in the sale of Ransomware kits.

0 Comments
Continue reading

North Korea Suspected as Responsible for WannaCry Attack

According to the homeland security adviser to the White House, Tom Bossert, international blame for the global WannaCry attack is being directed toward North Korea. Responsibility for the attack that spanned from May 12th to the 15th of 2017 has been firmly placed on the Democratic People’s Republic of Korea, which Bossert says is in agreement with the conclusions of Australia, Canada, Japan and New Zealand.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity Malware Efficiency User Tips Communication Data Privacy Hackers Tech Term Microsoft Mobile Device Internet Google Computer Smartphones Hardware IT Support Users Email Innovation Ransomware Windows 10 Managed IT Services Business Management Cybersecurity Small Business Android Communications Mobile Devices Workplace Tips Business Passwords Network Software Browser IT Services Cloud Outsourced IT Collaboration VoIp Information Applications Backup Wireless Saving Money Holiday Managed Service Social Media Apps Bandwidth Smartphone Cloud Computing Data Backup Managed IT services Hosted Solutions Employer-Employee Relationship Business Intelligence Miscellaneous Data recovery Internet of Things Wi-Fi Value Save Money Laptop Gmail Windows Blockchain Marketing Microsoft Office Upgrade Gadgets Networking Managed IT Service Chrome Tech Terms Connectivity Processor Company Culture Patch Management Healthcare Remote Computing Mobility Automation Facebook Office Cost Management Data Security Paperless Office Office 365 Compliance Artificial Intelligence Quick Tips Net Neutrality Voice over Internet Protocol Virtual Assistant Password Cortana Analytics Wireless Charging Telephony Remote Monitoring and Management G Suite Virtualization BDR RAM VPN Access Control Data Management Computers Medical IT Tablet Analysis Certification HIPAA Employees Authentication SSD A.I. BYOD Hybrid Cloud Conferencing Error instant Messaging Business Technology Antivirus Operating System IT budget SaaS Dongle Paper Document Management Windows Server 2008 R2 Telecommute Troubleshooting Health Excel Physical Security Maintenance Hard Drive Solid State Drive Authorization Chrome OS Movies Plug-In Wireless Internet Cables Lead Generation Network Attached Storage Vulnerabilities Technology Tips Display Staff Managing Stress Battery GDPR Ink Telecommuting Taskbar Update Knowledge eCommerce Training Router Tip of the week Processors Hard Disk Drive Twitter Proactive IT Help Desk Database Content Filtering Touchscreen Cryptocurrency Streaming Media Phishing Benchmarks Environment Comparison Personal Information Government PowerPoint Digital National Security Data loss Outlook Online Shopping Security Cameras Websites Internet Explorer User Tip Vulnerability Video Machine Learning Human Resources Inventory Unified Communications Data Breach Risk Management Business Continuity Cybercrime Microsoft Office 365 Windows 7 Backup and Disaster Recovery Downloads e-waste Specifications IT Management Storage E-Commerce Sports Workers Spam Profitability Voice over IP Reporting Word Safety Threat Spyware Customer Service Employee-Employer Relationship Data Protection Sales Big Data Tactics WannaCry Server Management Time Management Hard Drives Trends Eliminating Downtime disposal Bring Your Own Device Server Dark Web Payment Millennials Edge Updates Virus Amazon Mobile Security Microsoft Teams Settings Wearables Printing HP OneNote Electronic Health Records Alert Regulation Disaster Recovery Financial Printers